Copyright © 2012 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: January 2010
Second published: January 2012
Production Reference: 1190112
Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK.
ISBN 978-1-84968-394-4
Cover Image by Tina Negus ( <[email protected]>
)
Every effort has been made to make this book as complete and accurate as possible, but no warranty or fitness is implied regarding any information and/or products referenced in this book. The authors, at the time of publishing, are employees of IBM. The IBM Corporation provides a set of rules regarding publishing that applies to each employee. The IBM employees followed each of these rules as stated by IBM. Based on those rules the following statements are listed:
This book is not directly sponsored by IBM/Lotus or ISSL
The IBM employees received IBM legal permission to publish this book using an outside IBM Press publisher
The products referenced or mentioned in this book are listed for informational purposes only
The publisher and authors do not recommend any product, software, or hardware. You, the owner of your hardware, software, and data are responsible to make a determination of what is best for you and your company. The authors advise that you take careful consideration in determining your software; security and infrastructure needs.